From: Jonathan Tripathy <jt@puppetlabs.com> Date: Thu, 26 Nov 2015 16:48:18 +0000 (+0000) Subject: (MAINT) - Commented out CLUSTERIP tests as there are suspicions that the X-Git-Tag: 1.8.0~21^2 X-Git-Url: https://review.fuel-infra.org/gitweb?a=commitdiff_plain;h=3370e766244bbf3b2685922662d56fbea0ef7551;p=puppet-modules%2Fpuppetlabs-firewall.git (MAINT) - Commented out CLUSTERIP tests as there are suspicions that the ipt module is causing system reboots. --- diff --git a/spec/acceptance/firewall_clusterip_spec.rb b/spec/acceptance/firewall_clusterip_spec.rb index bdd6017..03fbd90 100644 --- a/spec/acceptance/firewall_clusterip_spec.rb +++ b/spec/acceptance/firewall_clusterip_spec.rb @@ -1,45 +1,49 @@ -require 'spec_helper_acceptance' - -describe 'firewall type', :unless => UNSUPPORTED_PLATFORMS.include?(fact('osfamily')) do - - before(:all) do - shell('iptables --flush; iptables -t nat --flush; iptables -t mangle --flush') - shell('ip6tables --flush; ip6tables -t nat --flush; ip6tables -t mangle --flush') - end - - # SLES doesn't have the CLUSTERIP module - if default['platform'] !~ /sles/ - describe 'clusterip' do - context 'cluster ipv4 test' do - it 'applies' do - pending("MODULES-2124 should be resolved for clusterip RHEL7 support") if default['platform'] =~ /el-7/ - pp = <<-EOS - class { '::firewall': } - firewall { - '830 - clusterip test': - chain => 'FORWARD', - jump => 'CLUSTERIP', - destination => '1.1.1.1', - iniface => 'eth0', - clusterip_new => true, - clusterip_hashmode => "sourceip", - clusterip_clustermac => "01:00:5E:00:00:00", - clusterip_total_nodes => "2", - clusterip_local_node => "1", - clusterip_hash_init => "1337", - } - EOS - - apply_manifest(pp, :catch_failures => true) - end - - it 'should contain the rule' do - pending("MODULES-2124 should be resolved for clusterip RHEL7 support") if default['platform'] =~ /el-7/ - shell('iptables-save') do |r| - expect(r.stdout).to match(/-A FORWARD -d (1.1.1.1\/32|1.1.1.1) -i eth0 -p tcp -m comment --comment "830 - clusterip test" -j CLUSTERIP --new --hashmode sourceip --clustermac 01:00:5E:00:00:00 --total-nodes 2 --local-node 1 --hash-init 1337/) - end - end - end - end - end -end + +# These tests have been commented out, as there are suspicions that the clusterIP ipt module is causing system reboots. + + +# require 'spec_helper_acceptance' + +# describe 'firewall type', :unless => UNSUPPORTED_PLATFORMS.include?(fact('osfamily')) do + +# before(:all) do +# shell('iptables --flush; iptables -t nat --flush; iptables -t mangle --flush') +# shell('ip6tables --flush; ip6tables -t nat --flush; ip6tables -t mangle --flush') +# end + +# # SLES doesn't have the CLUSTERIP module +# if default['platform'] !~ /sles/ +# describe 'clusterip' do +# context 'cluster ipv4 test' do +# it 'applies' do +# pending("MODULES-2124 should be resolved for clusterip RHEL7 support") if default['platform'] =~ /el-7/ +# pp = <<-EOS +# class { '::firewall': } +# firewall { +# '830 - clusterip test': +# chain => 'FORWARD', +# jump => 'CLUSTERIP', +# destination => '1.1.1.1', +# iniface => 'eth0', +# clusterip_new => true, +# clusterip_hashmode => "sourceip", +# clusterip_clustermac => "01:00:5E:00:00:00", +# clusterip_total_nodes => "2", +# clusterip_local_node => "1", +# clusterip_hash_init => "1337", +# } +# EOS + +# apply_manifest(pp, :catch_failures => true) +# end + +# it 'should contain the rule' do +# pending("MODULES-2124 should be resolved for clusterip RHEL7 support") if default['platform'] =~ /el-7/ +# shell('iptables-save') do |r| +# expect(r.stdout).to match(/-A FORWARD -d (1.1.1.1\/32|1.1.1.1) -i eth0 -p tcp -m comment --comment "830 - clusterip test" -j CLUSTERIP --new --hashmode sourceip --clustermac 01:00:5E:00:00:00 --total-nodes 2 --local-node 1 --hash-init 1337/) +# end +# end +# end +# end +# end +# end