+++ /dev/null
-
-# These tests have been commented out, as there are suspicions that the clusterIP ipt module is causing system reboots.
-
-# require 'spec_helper_acceptance'
-
-# describe 'firewall type', :unless => UNSUPPORTED_PLATFORMS.include?(fact('osfamily')) do
-
-# before(:all) do
-# shell('iptables --flush; iptables -t nat --flush; iptables -t mangle --flush')
-# shell('ip6tables --flush; ip6tables -t nat --flush; ip6tables -t mangle --flush')
-# end
-
-# # SLES doesn't have the CLUSTERIP module
-# if default['platform'] !~ /sles/
-# describe 'clusterip' do
-# context 'cluster ipv4 test' do
-# it 'applies' do
-# pending("MODULES-2124 should be resolved for clusterip RHEL7 support") if default['platform'] =~ /el-7/
-# pp = <<-EOS
-# class { '::firewall': }
-# firewall {
-# '830 - clusterip test':
-# chain => 'FORWARD',
-# jump => 'CLUSTERIP',
-# destination => '1.1.1.1',
-# iniface => 'eth0',
-# clusterip_new => true,
-# clusterip_hashmode => "sourceip",
-# clusterip_clustermac => "01:00:5E:00:00:00",
-# clusterip_total_nodes => "2",
-# clusterip_local_node => "1",
-# clusterip_hash_init => "1337",
-# }
-# EOS
-
-# apply_manifest(pp, :catch_failures => true)
-# end
-
-# it 'should contain the rule' do
-# pending("MODULES-2124 should be resolved for clusterip RHEL7 support") if default['platform'] =~ /el-7/
-# shell('iptables-save') do |r|
-# expect(r.stdout).to match(/-A FORWARD -d (1.1.1.1\/32|1.1.1.1) -i eth0 -p tcp -m comment --comment "830 - clusterip test" -j CLUSTERIP --new --hashmode sourceip --clustermac 01:00:5E:00:00:00 --total-nodes 2 --local-node 1 --hash-init 1337/) # rubocop:disable Metrics/LineLength : Cannot reduce length to required size
-# end
-# end
-# end
-# end
-# end
-# end
end
end
- context 'when LOCAL --limit-iface-in', unless: (fact('operatingsystem') == 'RedHat' && fact('operatingsystemmajrelease') <= '5') ||
- (fact('operatingsystem') == 'CentOS' && fact('operatingsystemmajrelease') <= '5') do
+ context 'when LOCAL --limit-iface-in', unless: (fact('osfamily') == 'RedHat' && fact('operatingsystemmajrelease') <= '5') do
pp97 = <<-PUPPETCODE
class { '::firewall': }
firewall { '613 - test':
end
end
- context 'when LOCAL --limit-iface-in fail', if: (fact('operatingsystem') == 'RedHat' && fact('operatingsystemmajrelease') <= '5') ||
- (fact('operatingsystem') == 'CentOS' && fact('operatingsystemmajrelease') <= '5') do
+ context 'when LOCAL --limit-iface-in fail', if: (fact('osfamily') == 'RedHat' && fact('operatingsystemmajrelease') <= '5') do
pp98 = <<-PUPPETCODE
class { '::firewall': }
firewall { '614 - test':
end
end
- context 'when duplicated LOCAL', unless: (fact('operatingsystem') == 'RedHat' && fact('operatingsystemmajrelease') <= '5') ||
- (fact('operatingsystem') == 'CentOS' && fact('operatingsystemmajrelease') <= '5') do
+ context 'when duplicated LOCAL', unless: (fact('osfamily') == 'RedHat' && fact('operatingsystemmajrelease') <= '5') do
pp99 = <<-PUPPETCODE
class { '::firewall': }
firewall { '615 - test':
end
end
- context 'when multiple addrtype', unless: (fact('operatingsystem') == 'RedHat' && fact('operatingsystemmajrelease') <= '5') ||
- (fact('operatingsystem') == 'CentOS' && fact('operatingsystemmajrelease') <= '5') do
+ context 'when multiple addrtype', unless: (fact('osfamily') == 'RedHat' && fact('operatingsystemmajrelease') <= '5') do
pp100 = <<-PUPPETCODE
class { '::firewall': }
firewall { '616 - test':
end
end
- context 'when multiple addrtype fail', if: (fact('operatingsystem') == 'RedHat' && fact('operatingsystemmajrelease') <= '5') ||
- (fact('operatingsystem') == 'CentOS' && fact('operatingsystemmajrelease') <= '5') do
+ context 'when multiple addrtype fail', if: (fact('osfamily') == 'RedHat' && fact('operatingsystemmajrelease') <= '5') do
pp101 = <<-PUPPETCODE
class { '::firewall': }
firewall { '616 - test':
end
end
- context 'when LOCAL --limit-iface-in', unless: (fact('operatingsystem') == 'RedHat' && fact('operatingsystemmajrelease') <= '5') ||
- (fact('operatingsystem') == 'CentOS' && fact('operatingsystemmajrelease') <= '5') do
+ context 'when LOCAL --limit-iface-in', unless: (fact('osfamily') == 'RedHat' && fact('operatingsystemmajrelease') <= '5') do
pp102 = <<-PUPPETCODE
class { '::firewall': }
firewall { '617 - test':
end
end
- context 'when LOCAL --limit-iface-in fail', if: (fact('operatingsystem') == 'RedHat' && fact('operatingsystemmajrelease') <= '5') ||
- (fact('operatingsystem') == 'CentOS' && fact('operatingsystemmajrelease') <= '5') do
+ context 'when LOCAL --limit-iface-in fail', if: (fact('osfamily') == 'RedHat' && fact('operatingsystemmajrelease') <= '5') do
pp103 = <<-PUPPETCODE
class { '::firewall': }
firewall { '618 - test':
end
end
- context 'when duplicated LOCAL', unless: (fact('operatingsystem') == 'RedHat' && fact('operatingsystemmajrelease') <= '5') ||
- (fact('operatingsystem') == 'CentOS' && fact('operatingsystemmajrelease') <= '5') do
+ context 'when duplicated LOCAL', unless: (fact('osfamily') == 'RedHat' && fact('operatingsystemmajrelease') <= '5') do
pp104 = <<-PUPPETCODE
class { '::firewall': }
firewall { '619 - test':
end
end
- context 'when multiple addrtype', unless: (fact('operatingsystem') == 'RedHat' && fact('operatingsystemmajrelease') <= '5') ||
- (fact('operatingsystem') == 'CentOS' && fact('operatingsystemmajrelease') <= '5') do
+ context 'when multiple addrtype', unless: (fact('osfamily') == 'RedHat' && fact('operatingsystemmajrelease') <= '5') do
pp105 = <<-PUPPETCODE
class { '::firewall': }
firewall { '620 - test':
end
end
- context 'when multiple addrtype fail', if: (fact('operatingsystem') == 'RedHat' && fact('operatingsystemmajrelease') <= '5') ||
- (fact('operatingsystem') == 'CentOS' && fact('operatingsystemmajrelease') <= '5') do
+ context 'when multiple addrtype fail', if: (fact('osfamily') == 'RedHat' && fact('operatingsystemmajrelease') <= '5') do
pp106 = <<-PUPPETCODE
class { '::firewall': }
firewall { '616 - test':