end
# RHEL5 does not support --random
- if default['platform'] !~ %r{el-5} && default['platform'] !~ %r{sles-10}
+ if default['platform'] !~ %r{el-5}
describe 'random' do
context 'when 192.168.1.1' do
pp40 = <<-PUPPETCODE
# iptables version 1.3.5 is not suppored by the ip6tables provider
# iptables version 1.4.7 fails for multiple hl entries
- if default['platform'] !~ %r{(el-5|el-6|sles-10|sles-11)}
+ if default['platform'] !~ %r{(el-5|el-6|sles-11)}
describe 'hop_limit' do
context 'when 5' do
pp42 = <<-PUPPETCODE
end
# iptables version 1.3.5 does not support masks on MARK rules
- if default['platform'] !~ %r{el-5} && default['platform'] !~ %r{sles-10}
+ if default['platform'] !~ %r{el-5}
describe 'set_mark' do
context 'when 0x3e8/0xffffffff' do
pp73 = <<-PUPPETCODE
end
it 'contains the rule' do
shell('iptables-save') do |r|
- if os[:family] == 'redhat' && os[:release].start_with?('5') || (default['platform'] =~ %r{sles-10})
+ if os[:family] == 'redhat' && os[:release].start_with?('5')
expect(r.stdout).to match(%r{-A INPUT -s 10.1.5.28 -p tcp -m mac --mac-source 0A:1B:3C:4D:5E:6F -m comment --comment "610 - test"})
else
expect(r.stdout).to match(%r{-A INPUT -s 10.1.5.28\/(32|255\.255\.255\.255) -p tcp -m mac --mac-source 0A:1B:3C:4D:5E:6F -m comment --comment "610 - test"})
end
describe 'iptables physdev tests' do
# iptables version 1.3.5 is not suppored by the ip6tables provider
- if default['platform'] !~ %r{el-5} && default['platform'] !~ %r{sles-10}
+ if default['platform'] !~ %r{el-5}
describe 'ip6tables physdev tests' do
context 'when physdev_in eth0' do
pp8 = <<-PUPPETCODE
end
end
- if default['platform'] !~ %r{el-5} && default['platform'] !~ %r{sles-10}
+ unless os[:family] == 'redhat' && os[:release].start_with?('5')
describe 'dscp ipv6 tests' do
context 'when set_dscp 0x01' do
pp3 = <<-PUPPETCODE
end
# Older OSes don't have addrtype so we leave those properties out.
# el-5 doesn't support ipv6 by default
- elsif default['platform'] !~ %r{el-5} && default['platform'] !~ %r{sles-10}
+ elsif default['platform'] !~ %r{el-5}
describe 'ip6tables ipt_modules tests' do
context 'when all the modules with multiple args' do
pp5 = <<-PUPPETCODE
ip6tables_flush_all_tables
end
- if default['platform'] !~ %r{el-5} && default['platform'] !~ %r{sles-10}
+ if default['platform'] !~ %r{el-5}
describe 'mss ipv6 tests' do
context 'when 1360' do
pp3 = <<-PUPPETCODE
require 'spec_helper_acceptance'
-if default['platform'] =~ %r{el-5} || default['platform'] =~ %r{sles-10}
+if default['platform'] =~ %r{el-5}
describe "firewall ip6tables doesn't work on 1.3.5 because --comment is missing" do
before :all do
iptables_flush_all_tables
ip6tables_flush_all_tables
end
- if default['platform'] !~ %r{el-5} && default['platform'] !~ %r{sles-10}
+ if default['platform'] !~ %r{el-5}
describe 'match_mark' do
context 'when 0x1' do
pp1 = <<-PUPPETCODE
end
end
- if default['platform'] !~ %r{el-5} && default['platform'] !~ %r{sles-10}
+ unless os[:family] == 'redhat' && os[:release].start_with?('5')
context 'when ipv6 chain purge' do
after(:all) do
ip6tables_flush_all_tables
end
end
- if default['platform'] !~ %r{sles-10}
- context 'when accepts rules utilizing the statistic module' do
- before :all do
- iptables_flush_all_tables
- # This command doesn't work with all versions/oses, so let it fail
- shell('iptables -t nat -A POSTROUTING -d 1.2.3.4/32 -o eth0 -m statistic --mode nth --every 2 -j SNAT --to-source 2.3.4.5', acceptable_exit_codes: [0, 1, 2])
- shell('iptables -t nat -A POSTROUTING -d 1.2.3.4/32 -o eth0 -m statistic --mode nth --every 1 --packet 0 -j SNAT --to-source 2.3.4.6')
- shell('iptables -t nat -A POSTROUTING -d 1.2.3.4/32 -o eth0 -m statistic --mode random --probability 0.99 -j SNAT --to-source 2.3.4.7')
- end
+ context 'when accepts rules utilizing the statistic module' do
+ before :all do
+ iptables_flush_all_tables
+ # This command doesn't work with all versions/oses, so let it fail
+ shell('iptables -t nat -A POSTROUTING -d 1.2.3.4/32 -o eth0 -m statistic --mode nth --every 2 -j SNAT --to-source 2.3.4.5', acceptable_exit_codes: [0, 1, 2])
+ shell('iptables -t nat -A POSTROUTING -d 1.2.3.4/32 -o eth0 -m statistic --mode nth --every 1 --packet 0 -j SNAT --to-source 2.3.4.6')
+ shell('iptables -t nat -A POSTROUTING -d 1.2.3.4/32 -o eth0 -m statistic --mode random --probability 0.99 -j SNAT --to-source 2.3.4.7')
+ end
- it do
- shell('puppet resource firewall') do |r|
- r.exit_code.should be_zero
- # don't check stdout, testing preexisting rules, output is normal
- r.stderr.should be_empty
- end
+ it do
+ shell('puppet resource firewall') do |r|
+ r.exit_code.should be_zero
+ # don't check stdout, testing preexisting rules, output is normal
+ r.stderr.should be_empty
end
end
end
# version of iptables that ships with el5 doesn't work with the
# ip6tables provider
# TODO: Test below fails if this file is run seperately. i.e. bundle exec rspec spec/acceptance/resource_cmd_spec.rb
- if default['platform'] !~ %r{el-5} && default['platform'] !~ %r{sles-10}
+ if default['platform'] !~ %r{el-5}
context 'when dport/sport with ip6tables' do
before :all do
if os['family'] == 'debian'