Blame SOURCES/0024-test-direct-verify-rule-order-with-multiple-address-.patch

47f735
From ed0b0a7f967f33729e4ec7472b4229f0317fd92d Mon Sep 17 00:00:00 2001
47f735
From: Eric Garver <eric@garver.life>
47f735
Date: Fri, 9 Apr 2021 13:34:31 -0400
47f735
Subject: [PATCH 24/30] test(direct): verify rule order with multiple address
47f735
 with -s/-d
47f735
47f735
Coverage: rhbz 1940928
47f735
Coverage: rhbz 1949552
47f735
(cherry picked from commit 80c30dacc066af4d6d71d298b5e47625ecee5bdf)
47f735
(cherry picked from commit c1262441db90108eb8044053ae1b93f66f0c2839)
47f735
---
47f735
 src/tests/regression/regression.at  |  1 +
47f735
 src/tests/regression/rhbz1940928.at | 52 +++++++++++++++++++++++++++++
47f735
 2 files changed, 53 insertions(+)
47f735
 create mode 100644 src/tests/regression/rhbz1940928.at
47f735
47f735
diff --git a/src/tests/regression/regression.at b/src/tests/regression/regression.at
47f735
index a49bb3b756e7..8156ee608189 100644
47f735
--- a/src/tests/regression/regression.at
47f735
+++ b/src/tests/regression/regression.at
47f735
@@ -39,3 +39,4 @@ m4_include([regression/rhbz1871298.at])
47f735
 m4_include([regression/rhbz1596304.at])
47f735
 m4_include([regression/gh703.at])
47f735
 m4_include([regression/ipset_netmask_allowed.at])
47f735
+m4_include([regression/rhbz1940928.at])
47f735
diff --git a/src/tests/regression/rhbz1940928.at b/src/tests/regression/rhbz1940928.at
47f735
new file mode 100644
47f735
index 000000000000..0a4367080b5e
47f735
--- /dev/null
47f735
+++ b/src/tests/regression/rhbz1940928.at
47f735
@@ -0,0 +1,52 @@
47f735
+FWD_START_TEST([direct -s/-d multiple addresses])
47f735
+AT_KEYWORDS(direct rhbz1940928 rhbz1949552)
47f735
+CHECK_IPTABLES
47f735
+
47f735
+dnl test triggers a limitation in iptables-restore
47f735
+dnl
47f735
+AT_CHECK([sed -i 's/^IndividualCalls.*/IndividualCalls=no/' ./firewalld.conf])
47f735
+FWD_RELOAD
47f735
+
47f735
+FWD_CHECK([--direct --add-rule ipv4 filter OUTPUT 0 -m state --state ESTABLISHED,RELATED -j ACCEPT], 0, [ignore], [ignore])
47f735
+FWD_CHECK([--direct --add-rule ipv4 filter OUTPUT 2 -p tcp -d 10.0.0.0/8,172.16.0.0/16,192.168.0.0/24 -j ACCEPT], 0, [ignore], [ignore])
47f735
+FWD_CHECK([--direct --add-rule ipv4 filter OUTPUT 2 -p udp -d 10.0.0.0/8,172.16.0.0/16,192.168.0.0/24 -j ACCEPT], 0, [ignore], [ignore])
47f735
+FWD_CHECK([--direct --add-rule ipv4 filter OUTPUT 9 -j DROP], 0, [ignore], [ignore])
47f735
+
47f735
+IPTABLES_LIST_RULES_ALWAYS([filter], [m4_if(iptables, FIREWALL_BACKEND, [OUTPUT_direct], [OUTPUT])], 0, [dnl
47f735
+		ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0            state RELATED,ESTABLISHED
47f735
+		ACCEPT     tcp  --  0.0.0.0/0            10.0.0.0/8
47f735
+		ACCEPT     tcp  --  0.0.0.0/0            172.16.0.0/16
47f735
+		ACCEPT     tcp  --  0.0.0.0/0            192.168.0.0/24
47f735
+		ACCEPT     udp  --  0.0.0.0/0            10.0.0.0/8
47f735
+		ACCEPT     udp  --  0.0.0.0/0            172.16.0.0/16
47f735
+		ACCEPT     udp  --  0.0.0.0/0            192.168.0.0/24
47f735
+		DROP       all  --  0.0.0.0/0            0.0.0.0/0
47f735
+])
47f735
+
47f735
+FWD_CHECK([--direct --add-rule ipv4 filter OUTPUT 1 -p sctp -d 10.0.0.0/8,172.16.0.0/16,192.168.0.0/24 -j ACCEPT], 0, [ignore], [ignore])
47f735
+
47f735
+IPTABLES_LIST_RULES_ALWAYS([filter], [m4_if(iptables, FIREWALL_BACKEND, [OUTPUT_direct], [OUTPUT])], 0, [dnl
47f735
+		ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0            state RELATED,ESTABLISHED
47f735
+		ACCEPT     sctp --  0.0.0.0/0            10.0.0.0/8
47f735
+		ACCEPT     sctp --  0.0.0.0/0            172.16.0.0/16
47f735
+		ACCEPT     sctp --  0.0.0.0/0            192.168.0.0/24
47f735
+		ACCEPT     tcp  --  0.0.0.0/0            10.0.0.0/8
47f735
+		ACCEPT     tcp  --  0.0.0.0/0            172.16.0.0/16
47f735
+		ACCEPT     tcp  --  0.0.0.0/0            192.168.0.0/24
47f735
+		ACCEPT     udp  --  0.0.0.0/0            10.0.0.0/8
47f735
+		ACCEPT     udp  --  0.0.0.0/0            172.16.0.0/16
47f735
+		ACCEPT     udp  --  0.0.0.0/0            192.168.0.0/24
47f735
+		DROP       all  --  0.0.0.0/0            0.0.0.0/0
47f735
+])
47f735
+
47f735
+FWD_CHECK([--direct --remove-rule ipv4 filter OUTPUT 0 -m state --state ESTABLISHED,RELATED -j ACCEPT], 0, [ignore], [ignore])
47f735
+FWD_CHECK([--direct --remove-rule ipv4 filter OUTPUT 1 -p sctp -d 10.0.0.0/8,172.16.0.0/16,192.168.0.0/24 -j ACCEPT], 0, [ignore], [ignore])
47f735
+FWD_CHECK([--direct --remove-rule ipv4 filter OUTPUT 2 -p tcp -d 10.0.0.0/8,172.16.0.0/16,192.168.0.0/24 -j ACCEPT], 0, [ignore], [ignore])
47f735
+FWD_CHECK([--direct --remove-rule ipv4 filter OUTPUT 2 -p udp -d 10.0.0.0/8,172.16.0.0/16,192.168.0.0/24 -j ACCEPT], 0, [ignore], [ignore])
47f735
+FWD_CHECK([--direct --remove-rule ipv4 filter OUTPUT 9 -j DROP], 0, [ignore], [ignore])
47f735
+
47f735
+
47f735
+IPTABLES_LIST_RULES_ALWAYS([filter], [m4_if(iptables, FIREWALL_BACKEND, [OUTPUT_direct], [OUTPUT])], 0, [dnl
47f735
+])
47f735
+
47f735
+FWD_END_TEST
47f735
-- 
47f735
2.27.0
47f735