Blame SOURCES/0027-test-enhance-test-for-rhbz1729097.patch

66253d
From a698ca94c40b6edf058995f9f2b1fc197a16efe4 Mon Sep 17 00:00:00 2001
66253d
From: Eric Garver <eric@garver.life>
66253d
Date: Thu, 16 Jan 2020 09:02:28 -0500
66253d
Subject: [PATCH 27/37] test: enhance test for rhbz1729097
66253d
66253d
(cherry picked from commit c2b8059559c210e586b03b44eaf189370b976770)
66253d
(cherry picked from commit 47368842f5519b43cb02cb4f2cca59b9049e5268)
66253d
---
66253d
 src/tests/regression/rhbz1715977.at | 107 +++++++++++++++++++++++++++-
66253d
 1 file changed, 105 insertions(+), 2 deletions(-)
66253d
66253d
diff --git a/src/tests/regression/rhbz1715977.at b/src/tests/regression/rhbz1715977.at
66253d
index ce6dd075c2b5..5de9b5679023 100644
66253d
--- a/src/tests/regression/rhbz1715977.at
66253d
+++ b/src/tests/regression/rhbz1715977.at
66253d
@@ -1,9 +1,112 @@
66253d
-FWD_START_TEST([rich rule destination with service destination])
66253d
-AT_KEYWORDS(rich service rhbz1715977)
66253d
+FWD_START_TEST([rich rule source/destination with service destination])
66253d
+AT_KEYWORDS(rich service rhbz1715977 rhbz1729097 rhbz1791783)
66253d
 
66253d
 FWD_CHECK([-q --permanent --zone=internal --add-interface=foobar0])
66253d
 FWD_CHECK([-q --permanent --zone=internal --add-rich-rule='rule family=ipv4 destination address="192.168.122.235/32" service name="ssh" accept'])
66253d
 FWD_RELOAD
66253d
+NFT_LIST_RULES([inet], [filter_IN_internal_allow], 0, [dnl
66253d
+    table inet firewalld {
66253d
+        chain filter_IN_internal_allow {
66253d
+            tcp dport 22 ct state new,untracked accept
66253d
+            ip daddr 224.0.0.251 udp dport 5353 ct state new,untracked accept
66253d
+            ip6 daddr ff02::fb udp dport 5353 ct state new,untracked accept
66253d
+            udp dport 137 ct helper set "helper-netbios-ns-udp"
66253d
+            udp dport 137 ct state new,untracked accept
66253d
+            udp dport 138 ct state new,untracked accept
66253d
+            ip6 daddr fe80::/64 udp dport 546 ct state new,untracked accept
66253d
+            tcp dport 9090 ct state new,untracked accept
66253d
+            ip daddr 192.168.122.235 tcp dport 22 ct state new,untracked accept
66253d
+        }
66253d
+    }
66253d
+])
66253d
+IPTABLES_LIST_RULES([filter], [IN_internal_allow], 0, [dnl
66253d
+    ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 ctstate NEW,UNTRACKED
66253d
+    ACCEPT udp -- 0.0.0.0/0 224.0.0.251 udp dpt:5353 ctstate NEW,UNTRACKED
66253d
+    ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:137 ctstate NEW,UNTRACKED
66253d
+    ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:138 ctstate NEW,UNTRACKED
66253d
+    ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:9090 ctstate NEW,UNTRACKED
66253d
+    ACCEPT tcp -- 0.0.0.0/0 192.168.122.235 tcp dpt:22 ctstate NEW,UNTRACKED
66253d
+])
66253d
+IP6TABLES_LIST_RULES([filter], [IN_internal_allow], 0, [dnl
66253d
+    ACCEPT tcp ::/0 ::/0 tcp dpt:22 ctstate NEW,UNTRACKED
66253d
+    ACCEPT udp ::/0 ff02::fb udp dpt:5353 ctstate NEW,UNTRACKED
66253d
+    ACCEPT udp ::/0 ::/0 udp dpt:137 ctstate NEW,UNTRACKED
66253d
+    ACCEPT udp ::/0 ::/0 udp dpt:138 ctstate NEW,UNTRACKED
66253d
+    ACCEPT udp ::/0 fe80::/64 udp dpt:546 ctstate NEW,UNTRACKED
66253d
+    ACCEPT tcp ::/0 ::/0 tcp dpt:9090 ctstate NEW,UNTRACKED
66253d
+])
66253d
+
66253d
+FWD_CHECK([-q --zone=internal --add-rich-rule='rule family=ipv4 destination address="192.168.111.222/32" source address="10.10.10.0/24" service name="ssh" accept'])
66253d
+NFT_LIST_RULES([inet], [filter_IN_internal_allow], 0, [dnl
66253d
+    table inet firewalld {
66253d
+        chain filter_IN_internal_allow {
66253d
+            tcp dport 22 ct state new,untracked accept
66253d
+            ip daddr 224.0.0.251 udp dport 5353 ct state new,untracked accept
66253d
+            ip6 daddr ff02::fb udp dport 5353 ct state new,untracked accept
66253d
+            udp dport 137 ct helper set "helper-netbios-ns-udp"
66253d
+            udp dport 137 ct state new,untracked accept
66253d
+            udp dport 138 ct state new,untracked accept
66253d
+            ip6 daddr fe80::/64 udp dport 546 ct state new,untracked accept
66253d
+            tcp dport 9090 ct state new,untracked accept
66253d
+            ip daddr 192.168.122.235 tcp dport 22 ct state new,untracked accept
66253d
+            ip daddr 192.168.111.222 ip saddr 10.10.10.0/24 tcp dport 22 ct state new,untracked accept
66253d
+        }
66253d
+    }
66253d
+])
66253d
+IPTABLES_LIST_RULES([filter], [IN_internal_allow], 0, [dnl
66253d
+    ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 ctstate NEW,UNTRACKED
66253d
+    ACCEPT udp -- 0.0.0.0/0 224.0.0.251 udp dpt:5353 ctstate NEW,UNTRACKED
66253d
+    ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:137 ctstate NEW,UNTRACKED
66253d
+    ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:138 ctstate NEW,UNTRACKED
66253d
+    ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:9090 ctstate NEW,UNTRACKED
66253d
+    ACCEPT tcp -- 0.0.0.0/0 192.168.122.235 tcp dpt:22 ctstate NEW,UNTRACKED
66253d
+    ACCEPT tcp -- 10.10.10.0/24 192.168.111.222 tcp dpt:22 ctstate NEW,UNTRACKED
66253d
+])
66253d
+IP6TABLES_LIST_RULES([filter], [IN_internal_allow], 0, [dnl
66253d
+    ACCEPT tcp ::/0 ::/0 tcp dpt:22 ctstate NEW,UNTRACKED
66253d
+    ACCEPT udp ::/0 ff02::fb udp dpt:5353 ctstate NEW,UNTRACKED
66253d
+    ACCEPT udp ::/0 ::/0 udp dpt:137 ctstate NEW,UNTRACKED
66253d
+    ACCEPT udp ::/0 ::/0 udp dpt:138 ctstate NEW,UNTRACKED
66253d
+    ACCEPT udp ::/0 fe80::/64 udp dpt:546 ctstate NEW,UNTRACKED
66253d
+    ACCEPT tcp ::/0 ::/0 tcp dpt:9090 ctstate NEW,UNTRACKED
66253d
+])
66253d
+
66253d
+FWD_CHECK([-q --zone=internal --add-rich-rule='rule family=ipv4 service name="ssdp" accept'])
66253d
+NFT_LIST_RULES([inet], [filter_IN_internal_allow], 0, [dnl
66253d
+    table inet firewalld {
66253d
+        chain filter_IN_internal_allow {
66253d
+            tcp dport 22 ct state new,untracked accept
66253d
+            ip daddr 224.0.0.251 udp dport 5353 ct state new,untracked accept
66253d
+            ip6 daddr ff02::fb udp dport 5353 ct state new,untracked accept
66253d
+            udp dport 137 ct helper set "helper-netbios-ns-udp"
66253d
+            udp dport 137 ct state new,untracked accept
66253d
+            udp dport 138 ct state new,untracked accept
66253d
+            ip6 daddr fe80::/64 udp dport 546 ct state new,untracked accept
66253d
+            tcp dport 9090 ct state new,untracked accept
66253d
+            ip daddr 192.168.122.235 tcp dport 22 ct state new,untracked accept
66253d
+            ip daddr 192.168.111.222 ip saddr 10.10.10.0/24 tcp dport 22 ct state new,untracked accept
66253d
+            ip daddr 239.255.255.250 udp dport 1900 ct state new,untracked accept
66253d
+        }
66253d
+    }
66253d
+])
66253d
+IPTABLES_LIST_RULES([filter], [IN_internal_allow], 0, [dnl
66253d
+    ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 ctstate NEW,UNTRACKED
66253d
+    ACCEPT udp -- 0.0.0.0/0 224.0.0.251 udp dpt:5353 ctstate NEW,UNTRACKED
66253d
+    ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:137 ctstate NEW,UNTRACKED
66253d
+    ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:138 ctstate NEW,UNTRACKED
66253d
+    ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:9090 ctstate NEW,UNTRACKED
66253d
+    ACCEPT tcp -- 0.0.0.0/0 192.168.122.235 tcp dpt:22 ctstate NEW,UNTRACKED
66253d
+    ACCEPT tcp -- 10.10.10.0/24 192.168.111.222 tcp dpt:22 ctstate NEW,UNTRACKED
66253d
+    ACCEPT udp -- 0.0.0.0/0 239.255.255.250 udp dpt:1900 ctstate NEW,UNTRACKED
66253d
+])
66253d
+IP6TABLES_LIST_RULES([filter], [IN_internal_allow], 0, [dnl
66253d
+    ACCEPT tcp ::/0 ::/0 tcp dpt:22 ctstate NEW,UNTRACKED
66253d
+    ACCEPT udp ::/0 ff02::fb udp dpt:5353 ctstate NEW,UNTRACKED
66253d
+    ACCEPT udp ::/0 ::/0 udp dpt:137 ctstate NEW,UNTRACKED
66253d
+    ACCEPT udp ::/0 ::/0 udp dpt:138 ctstate NEW,UNTRACKED
66253d
+    ACCEPT udp ::/0 fe80::/64 udp dpt:546 ctstate NEW,UNTRACKED
66253d
+    ACCEPT tcp ::/0 ::/0 tcp dpt:9090 ctstate NEW,UNTRACKED
66253d
+])
66253d
 
66253d
 FWD_CHECK([-q --zone=internal --add-rich-rule='rule family=ipv4 destination address="192.168.122.235/32" service name="mdns" accept'], 122, [ignore], [ignore])
66253d
 FWD_CHECK([-q --permanent --zone=internal --add-rich-rule='rule family=ipv4 destination address="192.168.122.235/32" service name="mdns" accept'])
66253d
-- 
66253d
2.23.0
66253d