Blame SOURCES/0034-chore-test-retab-some-test-cases.patch

66253d
From 9ffa72e5b9b3d36f8a2b52a3dcaac519f7f08b5e Mon Sep 17 00:00:00 2001
66253d
From: Eric Garver <eric@garver.life>
66253d
Date: Wed, 29 Jan 2020 10:56:06 -0500
66253d
Subject: [PATCH 34/37] chore: test: retab some test cases
66253d
66253d
Replace leading tabs with spaces.
66253d
66253d
(cherry picked from commit 890d8a60893a0c3975b792bcbd3a6c65419a8e8c)
66253d
(cherry picked from commit 9b2609406c0f20681bc02f98b24091e8f509e26f)
66253d
---
66253d
 src/tests/features/helpers_custom.at | 120 +++++++++++++--------------
66253d
 src/tests/regression/gh453.at        |  68 +++++++--------
66253d
 src/tests/regression/rhbz1506742.at  |   2 +-
66253d
 src/tests/regression/rhbz1734765.at  |  28 +++----
66253d
 4 files changed, 109 insertions(+), 109 deletions(-)
66253d
66253d
diff --git a/src/tests/features/helpers_custom.at b/src/tests/features/helpers_custom.at
66253d
index bf673bd70b33..bd4b52cfb1d6 100644
66253d
--- a/src/tests/features/helpers_custom.at
66253d
+++ b/src/tests/features/helpers_custom.at
66253d
@@ -33,32 +33,32 @@ ftptest
66253d
 FWD_CHECK([-q --add-service=ftptest])
66253d
 
66253d
 NFT_LIST_RULES([inet], [filter_IN_public_allow], 0, [dnl
66253d
-	table inet firewalld {
66253d
-		chain filter_IN_public_allow {
66253d
-			tcp dport 22 ct state new,untracked accept
66253d
-			ip6 daddr fe80::/64 udp dport 546 ct state new,untracked accept
66253d
-			tcp dport 9090 ct state new,untracked accept
66253d
-			tcp dport 2121 ct helper set "helper-ftptest-tcp"
66253d
-			tcp dport 2121 ct state new,untracked accept
66253d
-		}
66253d
-	}
66253d
+    table inet firewalld {
66253d
+        chain filter_IN_public_allow {
66253d
+            tcp dport 22 ct state new,untracked accept
66253d
+            ip6 daddr fe80::/64 udp dport 546 ct state new,untracked accept
66253d
+            tcp dport 9090 ct state new,untracked accept
66253d
+            tcp dport 2121 ct helper set "helper-ftptest-tcp"
66253d
+            tcp dport 2121 ct state new,untracked accept
66253d
+        }
66253d
+    }
66253d
 ])
66253d
 IPTABLES_LIST_RULES([raw], [PRE_public_allow], 0, [dnl
66253d
-	CT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:2121 CT helper ftp
66253d
+    CT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:2121 CT helper ftp
66253d
 ])
66253d
 IPTABLES_LIST_RULES([filter], [IN_public_allow], 0, [dnl
66253d
-	ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 ctstate NEW,UNTRACKED
66253d
-	ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:9090 ctstate NEW,UNTRACKED
66253d
-	ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:2121 ctstate NEW,UNTRACKED
66253d
+    ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 ctstate NEW,UNTRACKED
66253d
+    ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:9090 ctstate NEW,UNTRACKED
66253d
+    ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:2121 ctstate NEW,UNTRACKED
66253d
 ])
66253d
 IP6TABLES_LIST_RULES([raw], [PRE_public_allow], 0, [dnl
66253d
-	CT tcp ::/0 ::/0 tcp dpt:2121 CT helper ftp
66253d
+    CT tcp ::/0 ::/0 tcp dpt:2121 CT helper ftp
66253d
 ])
66253d
 IP6TABLES_LIST_RULES([filter], [IN_public_allow], 0, [dnl
66253d
-	ACCEPT tcp ::/0 ::/0 tcp dpt:22 ctstate NEW,UNTRACKED
66253d
-	ACCEPT udp ::/0 fe80::/64 udp dpt:546 ctstate NEW,UNTRACKED
66253d
-	ACCEPT tcp ::/0 ::/0 tcp dpt:9090 ctstate NEW,UNTRACKED
66253d
-	ACCEPT tcp ::/0 ::/0 tcp dpt:2121 ctstate NEW,UNTRACKED
66253d
+    ACCEPT tcp ::/0 ::/0 tcp dpt:22 ctstate NEW,UNTRACKED
66253d
+    ACCEPT udp ::/0 fe80::/64 udp dpt:546 ctstate NEW,UNTRACKED
66253d
+    ACCEPT tcp ::/0 ::/0 tcp dpt:9090 ctstate NEW,UNTRACKED
66253d
+    ACCEPT tcp ::/0 ::/0 tcp dpt:2121 ctstate NEW,UNTRACKED
66253d
 ])
66253d
 
66253d
 dnl Same thing as above, but with the new "helper" in service.
66253d
@@ -90,32 +90,32 @@ ftptest
66253d
 FWD_CHECK([-q --add-service=ftptest])
66253d
 
66253d
 NFT_LIST_RULES([inet], [filter_IN_public_allow], 0, [dnl
66253d
-	table inet firewalld {
66253d
-		chain filter_IN_public_allow {
66253d
-			tcp dport 22 ct state new,untracked accept
66253d
-			ip6 daddr fe80::/64 udp dport 546 ct state new,untracked accept
66253d
-			tcp dport 9090 ct state new,untracked accept
66253d
-			tcp dport 2121 ct helper set "helper-ftptest-tcp"
66253d
-			tcp dport 2121 ct state new,untracked accept
66253d
-		}
66253d
-	}
66253d
+    table inet firewalld {
66253d
+        chain filter_IN_public_allow {
66253d
+            tcp dport 22 ct state new,untracked accept
66253d
+            ip6 daddr fe80::/64 udp dport 546 ct state new,untracked accept
66253d
+            tcp dport 9090 ct state new,untracked accept
66253d
+            tcp dport 2121 ct helper set "helper-ftptest-tcp"
66253d
+            tcp dport 2121 ct state new,untracked accept
66253d
+        }
66253d
+    }
66253d
 ])
66253d
 IPTABLES_LIST_RULES([raw], [PRE_public_allow], 0, [dnl
66253d
-	CT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:2121 CT helper ftp
66253d
+    CT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:2121 CT helper ftp
66253d
 ])
66253d
 IPTABLES_LIST_RULES([filter], [IN_public_allow], 0, [dnl
66253d
-	ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 ctstate NEW,UNTRACKED
66253d
-	ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:9090 ctstate NEW,UNTRACKED
66253d
-	ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:2121 ctstate NEW,UNTRACKED
66253d
+    ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 ctstate NEW,UNTRACKED
66253d
+    ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:9090 ctstate NEW,UNTRACKED
66253d
+    ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:2121 ctstate NEW,UNTRACKED
66253d
 ])
66253d
 IP6TABLES_LIST_RULES([raw], [PRE_public_allow], 0, [dnl
66253d
-	CT tcp ::/0 ::/0 tcp dpt:2121 CT helper ftp
66253d
+    CT tcp ::/0 ::/0 tcp dpt:2121 CT helper ftp
66253d
 ])
66253d
 IP6TABLES_LIST_RULES([filter], [IN_public_allow], 0, [dnl
66253d
-	ACCEPT tcp ::/0 ::/0 tcp dpt:22 ctstate NEW,UNTRACKED
66253d
-	ACCEPT udp ::/0 fe80::/64 udp dpt:546 ctstate NEW,UNTRACKED
66253d
-	ACCEPT tcp ::/0 ::/0 tcp dpt:9090 ctstate NEW,UNTRACKED
66253d
-	ACCEPT tcp ::/0 ::/0 tcp dpt:2121 ctstate NEW,UNTRACKED
66253d
+    ACCEPT tcp ::/0 ::/0 tcp dpt:22 ctstate NEW,UNTRACKED
66253d
+    ACCEPT udp ::/0 fe80::/64 udp dpt:546 ctstate NEW,UNTRACKED
66253d
+    ACCEPT tcp ::/0 ::/0 tcp dpt:9090 ctstate NEW,UNTRACKED
66253d
+    ACCEPT tcp ::/0 ::/0 tcp dpt:2121 ctstate NEW,UNTRACKED
66253d
 ])
66253d
 
66253d
 dnl again, but with both "module" and "helper"
66253d
@@ -128,38 +128,38 @@ FWD_RELOAD
66253d
 FWD_CHECK([-q --add-service=ftptest])
66253d
 
66253d
 NFT_LIST_RULES([inet], [filter_IN_public_allow], 0, [dnl
66253d
-	table inet firewalld {
66253d
-		chain filter_IN_public_allow {
66253d
-			tcp dport 22 ct state new,untracked accept
66253d
-			ip6 daddr fe80::/64 udp dport 546 ct state new,untracked accept
66253d
-			tcp dport 9090 ct state new,untracked accept
66253d
-			tcp dport 21 ct helper set "helper-ftp-tcp"
66253d
-			tcp dport 2121 ct helper set "helper-ftptest-tcp"
66253d
-			tcp dport 2121 ct state new,untracked accept
66253d
-			tcp dport 21 ct state new,untracked accept
66253d
-		}
66253d
-	}
66253d
+    table inet firewalld {
66253d
+        chain filter_IN_public_allow {
66253d
+            tcp dport 22 ct state new,untracked accept
66253d
+            ip6 daddr fe80::/64 udp dport 546 ct state new,untracked accept
66253d
+            tcp dport 9090 ct state new,untracked accept
66253d
+            tcp dport 21 ct helper set "helper-ftp-tcp"
66253d
+            tcp dport 2121 ct helper set "helper-ftptest-tcp"
66253d
+            tcp dport 2121 ct state new,untracked accept
66253d
+            tcp dport 21 ct state new,untracked accept
66253d
+        }
66253d
+    }
66253d
 ])
66253d
 IPTABLES_LIST_RULES([raw], [PRE_public_allow], 0, [dnl
66253d
-	CT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:21 CT helper ftp
66253d
-	CT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:2121 CT helper ftp
66253d
+    CT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:21 CT helper ftp
66253d
+    CT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:2121 CT helper ftp
66253d
 ])
66253d
 IPTABLES_LIST_RULES([filter], [IN_public_allow], 0, [dnl
66253d
-	ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 ctstate NEW,UNTRACKED
66253d
-	ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:9090 ctstate NEW,UNTRACKED
66253d
-	ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:2121 ctstate NEW,UNTRACKED
66253d
-	ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:21 ctstate NEW,UNTRACKED
66253d
+    ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 ctstate NEW,UNTRACKED
66253d
+    ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:9090 ctstate NEW,UNTRACKED
66253d
+    ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:2121 ctstate NEW,UNTRACKED
66253d
+    ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:21 ctstate NEW,UNTRACKED
66253d
 ])
66253d
 IP6TABLES_LIST_RULES([raw], [PRE_public_allow], 0, [dnl
66253d
-	CT tcp ::/0 ::/0 tcp dpt:21 CT helper ftp
66253d
-	CT tcp ::/0 ::/0 tcp dpt:2121 CT helper ftp
66253d
+    CT tcp ::/0 ::/0 tcp dpt:21 CT helper ftp
66253d
+    CT tcp ::/0 ::/0 tcp dpt:2121 CT helper ftp
66253d
 ])
66253d
 IP6TABLES_LIST_RULES([filter], [IN_public_allow], 0, [dnl
66253d
-	ACCEPT tcp ::/0 ::/0 tcp dpt:22 ctstate NEW,UNTRACKED
66253d
-	ACCEPT udp ::/0 fe80::/64 udp dpt:546 ctstate NEW,UNTRACKED
66253d
-	ACCEPT tcp ::/0 ::/0 tcp dpt:9090 ctstate NEW,UNTRACKED
66253d
-	ACCEPT tcp ::/0 ::/0 tcp dpt:2121 ctstate NEW,UNTRACKED
66253d
-	ACCEPT tcp ::/0 ::/0 tcp dpt:21 ctstate NEW,UNTRACKED
66253d
+    ACCEPT tcp ::/0 ::/0 tcp dpt:22 ctstate NEW,UNTRACKED
66253d
+    ACCEPT udp ::/0 fe80::/64 udp dpt:546 ctstate NEW,UNTRACKED
66253d
+    ACCEPT tcp ::/0 ::/0 tcp dpt:9090 ctstate NEW,UNTRACKED
66253d
+    ACCEPT tcp ::/0 ::/0 tcp dpt:2121 ctstate NEW,UNTRACKED
66253d
+    ACCEPT tcp ::/0 ::/0 tcp dpt:21 ctstate NEW,UNTRACKED
66253d
 ])
66253d
 
66253d
 FWD_END_TEST
66253d
diff --git a/src/tests/regression/gh453.at b/src/tests/regression/gh453.at
66253d
index 6d820fce840a..61bc90aae673 100644
66253d
--- a/src/tests/regression/gh453.at
66253d
+++ b/src/tests/regression/gh453.at
66253d
@@ -8,50 +8,50 @@ FWD_CHECK([-q --set-automatic-helpers=no])
66253d
 
66253d
 FWD_CHECK([-q --add-service=ftp])
66253d
 NS_CHECK([nft list ruleset | TRIM_WHITESPACE |grep -A3 "ct helper helper-ftp-tcp"], 0, [m4_strip([dnl
66253d
-	ct helper helper-ftp-tcp {
66253d
-	type "ftp" protocol tcp
66253d
-	l3proto inet
66253d
-	}
66253d
+    ct helper helper-ftp-tcp {
66253d
+    type "ftp" protocol tcp
66253d
+    l3proto inet
66253d
+    }
66253d
 ])])
66253d
 NFT_LIST_RULES([inet], [filter_IN_public_allow], 0, [dnl
66253d
-	table inet firewalld {
66253d
-	chain filter_IN_public_allow {
66253d
-	tcp dport 22 ct state new,untracked accept
66253d
-	ip6 daddr fe80::/64 udp dport 546 ct state new,untracked accept
66253d
-	tcp dport 9090 ct state new,untracked accept
66253d
-	tcp dport 21 ct helper set "helper-ftp-tcp"
66253d
-	tcp dport 21 ct state new,untracked accept
66253d
-	}
66253d
-	}
66253d
+    table inet firewalld {
66253d
+    chain filter_IN_public_allow {
66253d
+    tcp dport 22 ct state new,untracked accept
66253d
+    ip6 daddr fe80::/64 udp dport 546 ct state new,untracked accept
66253d
+    tcp dport 9090 ct state new,untracked accept
66253d
+    tcp dport 21 ct helper set "helper-ftp-tcp"
66253d
+    tcp dport 21 ct state new,untracked accept
66253d
+    }
66253d
+    }
66253d
 ])
66253d
 
66253d
 FWD_CHECK([-q --add-service=sip])
66253d
 NS_CHECK([nft list ruleset | TRIM_WHITESPACE |grep -A3 "ct helper helper-sip-tcp"], 0, [m4_strip([dnl
66253d
-	ct helper helper-sip-tcp {
66253d
-	type "sip" protocol tcp
66253d
-	l3proto inet
66253d
-	}
66253d
+    ct helper helper-sip-tcp {
66253d
+    type "sip" protocol tcp
66253d
+    l3proto inet
66253d
+    }
66253d
 ])])
66253d
 NS_CHECK([nft list ruleset | TRIM_WHITESPACE |grep -A3 "ct helper helper-sip-udp"], 0, [m4_strip([dnl
66253d
-	ct helper helper-sip-udp {
66253d
-	type "sip" protocol udp
66253d
-	l3proto inet
66253d
-	}
66253d
+    ct helper helper-sip-udp {
66253d
+    type "sip" protocol udp
66253d
+    l3proto inet
66253d
+    }
66253d
 ])])
66253d
 NFT_LIST_RULES([inet], [filter_IN_public_allow], 0, [dnl
66253d
-	table inet firewalld {
66253d
-	chain filter_IN_public_allow {
66253d
-	tcp dport 22 ct state new,untracked accept
66253d
-	ip6 daddr fe80::/64 udp dport 546 ct state new,untracked accept
66253d
-	tcp dport 9090 ct state new,untracked accept
66253d
-	tcp dport 21 ct helper set "helper-ftp-tcp"
66253d
-	tcp dport 21 ct state new,untracked accept
66253d
-	tcp dport 5060 ct helper set "helper-sip-tcp"
66253d
-	udp dport 5060 ct helper set "helper-sip-udp"
66253d
-	tcp dport 5060 ct state new,untracked accept
66253d
-	udp dport 5060 ct state new,untracked accept
66253d
-	}
66253d
-	}
66253d
+    table inet firewalld {
66253d
+    chain filter_IN_public_allow {
66253d
+    tcp dport 22 ct state new,untracked accept
66253d
+    ip6 daddr fe80::/64 udp dport 546 ct state new,untracked accept
66253d
+    tcp dport 9090 ct state new,untracked accept
66253d
+    tcp dport 21 ct helper set "helper-ftp-tcp"
66253d
+    tcp dport 21 ct state new,untracked accept
66253d
+    tcp dport 5060 ct helper set "helper-sip-tcp"
66253d
+    udp dport 5060 ct helper set "helper-sip-udp"
66253d
+    tcp dport 5060 ct state new,untracked accept
66253d
+    udp dport 5060 ct state new,untracked accept
66253d
+    }
66253d
+    }
66253d
 ])
66253d
 
66253d
 FWD_END_TEST
66253d
diff --git a/src/tests/regression/rhbz1506742.at b/src/tests/regression/rhbz1506742.at
66253d
index 48b224731fbc..2ab4f1a9cef1 100644
66253d
--- a/src/tests/regression/rhbz1506742.at
66253d
+++ b/src/tests/regression/rhbz1506742.at
66253d
@@ -20,4 +20,4 @@ FWD_CHECK([-q --ipset=foobar --query-entry=1.2.3.4], 32, ignore, ignore)
66253d
 FWD_CHECK([-q --ipset=foobar --remove-entries-from-file=foobar_entries.txt])
66253d
 FWD_END_TEST([-e '/Error: IPSET_WITH_TIMEOUT/d' dnl
66253d
               -e '/ERROR: IPSET_WITH_TIMEOUT/d' dnl
66253d
-			  -e '/WARNING: NOT_ENABLED/d'])
66253d
+              -e '/WARNING: NOT_ENABLED/d'])
66253d
diff --git a/src/tests/regression/rhbz1734765.at b/src/tests/regression/rhbz1734765.at
66253d
index bb054bdb0361..b5023a058a55 100644
66253d
--- a/src/tests/regression/rhbz1734765.at
66253d
+++ b/src/tests/regression/rhbz1734765.at
66253d
@@ -44,22 +44,22 @@ FWD_CHECK([-q --permanent --zone=trusted --add-interface=foobar1])
66253d
 FWD_RELOAD
66253d
 
66253d
 NFT_LIST_SET([ipsetv4], 0, [dnl
66253d
-	table inet firewalld {
66253d
-		set ipsetv4 {
66253d
-			type ipv4_addr
66253d
-			flags interval
66253d
-			elements = { 192.0.2.12 }
66253d
-		}
66253d
-	}
66253d
+    table inet firewalld {
66253d
+        set ipsetv4 {
66253d
+            type ipv4_addr
66253d
+            flags interval
66253d
+            elements = { 192.0.2.12 }
66253d
+        }
66253d
+    }
66253d
 ])
66253d
 NFT_LIST_SET([ipsetv6], 0, [dnl
66253d
-	table inet firewalld {
66253d
-		set ipsetv6 {
66253d
-			type ipv6_addr
66253d
-			flags interval
66253d
-			elements = { ::2 }
66253d
-		}
66253d
-	}
66253d
+    table inet firewalld {
66253d
+        set ipsetv6 {
66253d
+            type ipv6_addr
66253d
+            flags interval
66253d
+            elements = { ::2 }
66253d
+        }
66253d
+    }
66253d
 ])
66253d
 
66253d
 FWD_CHECK([-q --zone=foobar_010 --add-source="10.10.10.10"])
66253d
-- 
66253d
2.23.0
66253d