diff options
| -rwxr-xr-x | smoketest/scripts/cli/test_firewall.py | 30 | ||||
| -rwxr-xr-x | smoketest/scripts/cli/test_nat66.py | 4 | ||||
| -rwxr-xr-x | smoketest/scripts/cli/test_policy_route.py | 12 | 
3 files changed, 23 insertions, 23 deletions
| diff --git a/smoketest/scripts/cli/test_firewall.py b/smoketest/scripts/cli/test_firewall.py index 0ca2407e4..8e4aac788 100755 --- a/smoketest/scripts/cli/test_firewall.py +++ b/smoketest/scripts/cli/test_firewall.py @@ -216,12 +216,12 @@ class TestFirewall(VyOSUnitTestSHIM.TestCase):          nftables_search = [              [f'iifname "{interface}"', f'jump NAME_{name}'], -            ['saddr 172.16.20.10', 'daddr 172.16.10.10', 'log prefix "[smoketest-1-A]" level debug', 'ip ttl 15','return'], -            ['tcp flags & (syn | ack) == syn', 'tcp dport { 8888 }', 'log prefix "[smoketest-2-R]" level err', 'ip ttl > 102', 'reject'], -            ['tcp dport { 22 }', 'limit rate 5/minute', 'return'], +            ['saddr 172.16.20.10', 'daddr 172.16.10.10', 'log prefix "[smoketest-1-A]" level debug', 'ip ttl 15', 'return'], +            ['tcp flags syn / syn,ack', 'tcp dport 8888', 'log prefix "[smoketest-2-R]" level err', 'ip ttl > 102', 'reject'], +            ['tcp dport 22', 'limit rate 5/minute', 'return'],              ['log prefix "[smoketest-default-D]"','smoketest default-action', 'drop'], -            ['tcp dport { 22 }', 'add @RECENT_smoketest_4 { ip saddr limit rate over 10/minute burst 10 packets }', 'drop'], -            [f'tcp flags & syn == syn tcp option maxseg size {mss_range}'], +            ['tcp dport 22', 'add @RECENT_smoketest_4 { ip saddr limit rate over 10/minute burst 10 packets }', 'drop'], +            ['tcp flags & syn == syn', f'tcp option maxseg size {mss_range}'],          ]          self.verify_nftables(nftables_search, 'ip vyos_filter') @@ -253,8 +253,8 @@ class TestFirewall(VyOSUnitTestSHIM.TestCase):          nftables_search = [              [f'iifname "{interface}"', f'jump NAME_{name}'],              ['ip length { 64, 512, 1024 }', 'ip dscp { 0x11, 0x34 }', 'return'], -            ['ip length { 1-30000 }', 'ip length != { 60000-65535 }', 'ip dscp { 0x03-0x0b }', 'ip dscp != { 0x15-0x19 }', 'return'], -            [f'log prefix "[{name}-default-D]" drop'] +            ['ip length 1-30000', 'ip length != 60000-65535', 'ip dscp 0x03-0x0b', 'ip dscp != 0x15-0x19', 'return'], +            [f'log prefix "[{name}-default-D]"', 'drop']          ]          self.verify_nftables(nftables_search, 'ip vyos_filter') @@ -283,7 +283,7 @@ class TestFirewall(VyOSUnitTestSHIM.TestCase):          nftables_search = [              [f'iifname "{interface}"', f'jump NAME6_{name}'],              ['saddr 2002::1', 'daddr 2002::1:1', 'log prefix "[v6-smoketest-1-A]" level crit', 'return'], -            ['meta l4proto { tcp, udp }', 'th dport { 8888 }', 'reject'], +            ['meta l4proto { tcp, udp }', 'th dport 8888', 'reject'],              ['smoketest default-action', f'log prefix "[{name}-default-D]"', 'drop']          ] @@ -316,7 +316,7 @@ class TestFirewall(VyOSUnitTestSHIM.TestCase):          nftables_search = [              [f'iifname "{interface}"', f'jump NAME6_{name}'],              ['ip6 length { 65, 513, 1025 }', 'ip6 dscp { af21, 0x35 }', 'return'], -            ['ip6 length { 1-1999 }', 'ip6 length != { 60000-65535 }', 'ip6 dscp { 0x04-0x0e }', 'ip6 dscp != { 0x1f-0x23 }', 'return'], +            ['ip6 length 1-1999', 'ip6 length != 60000-65535', 'ip6 dscp 0x04-0x0e', 'ip6 dscp != 0x1f-0x23', 'return'],              [f'log prefix "[{name}-default-D]"', 'drop']          ] @@ -365,9 +365,9 @@ class TestFirewall(VyOSUnitTestSHIM.TestCase):          nftables_search = [              [f'iifname "{interface}"', f'jump NAME_{name}'],              ['ct state { established, related }', 'return'], -            ['ct state { invalid }', 'reject'], -            ['ct state { new }', 'ct status { dnat }', 'return'], -            ['ct state { established, new }', 'ct status { snat }', 'return'], +            ['ct state invalid', 'reject'], +            ['ct state new', 'ct status dnat', 'return'], +            ['ct state { established, new }', 'ct status snat', 'return'],              ['drop', f'comment "{name} default-action drop"']          ] @@ -403,11 +403,11 @@ class TestFirewall(VyOSUnitTestSHIM.TestCase):              ['chain VZONE_smoketest-eth0'],              ['chain VZONE_smoketest-local_IN'],              ['chain VZONE_smoketest-local_OUT'], -            ['oifname { "eth0" }', 'jump VZONE_smoketest-eth0'], +            ['oifname "eth0"', 'jump VZONE_smoketest-eth0'],              ['jump VZONE_smoketest-local_IN'],              ['jump VZONE_smoketest-local_OUT'], -            ['iifname { "eth0" }', 'jump NAME_smoketest'], -            ['oifname { "eth0" }', 'jump NAME_smoketest'] +            ['iifname "eth0"', 'jump NAME_smoketest'], +            ['oifname "eth0"', 'jump NAME_smoketest']          ]          nftables_output = cmd('sudo nft list table ip vyos_filter') diff --git a/smoketest/scripts/cli/test_nat66.py b/smoketest/scripts/cli/test_nat66.py index c5db066db..537b094a4 100755 --- a/smoketest/scripts/cli/test_nat66.py +++ b/smoketest/scripts/cli/test_nat66.py @@ -150,7 +150,7 @@ class TestNAT66(VyOSUnitTestSHIM.TestCase):          self.cli_commit()          nftables_search = [ -            ['iifname "eth1"', 'tcp dport { 4545 } ip6 saddr 2001:db8:2222::/64 tcp sport { 8080 } dnat to 2001:db8:1111::1:5555'] +            ['iifname "eth1"', 'tcp dport 4545', 'ip6 saddr 2001:db8:2222::/64', 'tcp sport 8080', 'dnat to 2001:db8:1111::1:5555']          ]          self.verify_nftables(nftables_search, 'ip6 nat') @@ -219,7 +219,7 @@ class TestNAT66(VyOSUnitTestSHIM.TestCase):          self.cli_commit()          nftables_search = [ -            ['oifname "eth1"', 'ip6 saddr 2001:db8:2222::/64 tcp dport { 9999 } tcp sport { 8080 } snat to 2001:db8:1111::1:80'] +            ['oifname "eth1"', 'ip6 saddr 2001:db8:2222::/64', 'tcp dport 9999', 'tcp sport 8080', 'snat to 2001:db8:1111::1:80']          ]          self.verify_nftables(nftables_search, 'ip6 nat') diff --git a/smoketest/scripts/cli/test_policy_route.py b/smoketest/scripts/cli/test_policy_route.py index 4abbeba3c..046e385bb 100755 --- a/smoketest/scripts/cli/test_policy_route.py +++ b/smoketest/scripts/cli/test_policy_route.py @@ -127,7 +127,7 @@ class TestPolicyRoute(VyOSUnitTestSHIM.TestCase):          nftables_search = [              [f'iifname "{interface}"', 'jump VYOS_PBR_smoketest'], -            ['tcp flags & (syn | ack) == syn', 'tcp dport { 8888 }', 'meta mark set ' + mark_hex] +            ['tcp flags syn / syn,ack', 'tcp dport 8888', 'meta mark set ' + mark_hex]          ]          self.verify_nftables(nftables_search, 'ip mangle') @@ -136,7 +136,7 @@ class TestPolicyRoute(VyOSUnitTestSHIM.TestCase):          nftables6_search = [              [f'iifname "{interface}"', 'jump VYOS_PBR6_smoketest'], -            ['meta l4proto { tcp, udp }', 'th dport { 8888 }', 'meta mark set ' + mark_hex] +            ['meta l4proto { tcp, udp }', 'th dport 8888', 'meta mark set ' + mark_hex]          ]          self.verify_nftables(nftables6_search, 'ip6 mangle') @@ -214,8 +214,8 @@ class TestPolicyRoute(VyOSUnitTestSHIM.TestCase):          nftables_search = [              [f'iifname "{interface}"', 'jump VYOS_PBR_smoketest'],              ['meta l4proto udp', 'drop'], -            ['tcp flags & (syn | ack) == syn', 'meta mark set ' + mark_hex], -            ['ct state { new }', 'tcp dport { 22 }', 'ip saddr 198.51.100.0/24', 'ip ttl > 2', 'meta mark set ' + mark_hex], +            ['tcp flags syn / syn,ack', 'meta mark set ' + mark_hex], +            ['ct state new', 'tcp dport 22', 'ip saddr 198.51.100.0/24', 'ip ttl > 2', 'meta mark set ' + mark_hex],              ['meta l4proto icmp', 'log prefix "[smoketest-4-A]"', 'icmp type echo-request', 'ip length { 128, 1024-2048 }', 'meta mark set ' + mark_hex],              ['ip dscp { 0x29, 0x39-0x3b }', 'meta mark set ' + mark_hex]          ] @@ -226,8 +226,8 @@ class TestPolicyRoute(VyOSUnitTestSHIM.TestCase):          nftables6_search = [              [f'iifname "{interface}"', 'jump VYOS_PBR6_smoketest'],              ['meta l4proto udp', 'drop'], -            ['tcp flags & (syn | ack) == syn', 'meta mark set ' + mark_hex], -            ['ct state { new }', 'tcp dport { 22 }', 'ip6 saddr 2001:db8::/64', 'ip6 hoplimit > 2', 'meta mark set ' + mark_hex], +            ['tcp flags syn / syn,ack', 'meta mark set ' + mark_hex], +            ['ct state new', 'tcp dport 22', 'ip6 saddr 2001:db8::/64', 'ip6 hoplimit > 2', 'meta mark set ' + mark_hex],              ['meta l4proto ipv6-icmp', 'log prefix "[smoketest6-4-A]"', 'icmpv6 type echo-request', 'ip6 length != { 128, 1024-2048 }', 'meta mark set ' + mark_hex],              ['ip6 dscp != { 0x0e-0x13, 0x3d }', 'meta mark set ' + mark_hex]          ] | 
