From: Jonathan Tripathy <jt@puppetlabs.com>
Date: Thu, 26 Nov 2015 16:48:18 +0000 (+0000)
Subject: (MAINT) - Commented out CLUSTERIP tests as there are suspicions that the
X-Git-Tag: 1.8.0~21^2
X-Git-Url: https://review.fuel-infra.org/gitweb?a=commitdiff_plain;h=3370e766244bbf3b2685922662d56fbea0ef7551;p=puppet-modules%2Fpuppetlabs-firewall.git

(MAINT) - Commented out CLUSTERIP tests as there are suspicions that the
ipt module is causing system reboots.
---

diff --git a/spec/acceptance/firewall_clusterip_spec.rb b/spec/acceptance/firewall_clusterip_spec.rb
index bdd6017..03fbd90 100644
--- a/spec/acceptance/firewall_clusterip_spec.rb
+++ b/spec/acceptance/firewall_clusterip_spec.rb
@@ -1,45 +1,49 @@
-require 'spec_helper_acceptance'
-
-describe 'firewall type', :unless => UNSUPPORTED_PLATFORMS.include?(fact('osfamily')) do
-
-  before(:all) do
-    shell('iptables --flush; iptables -t nat --flush; iptables -t mangle --flush')
-    shell('ip6tables --flush; ip6tables -t nat --flush; ip6tables -t mangle --flush')
-  end
-
-  # SLES doesn't have the CLUSTERIP module
-  if default['platform'] !~ /sles/
-    describe 'clusterip' do
-      context 'cluster ipv4 test' do
-        it 'applies' do
-          pending("MODULES-2124 should be resolved for clusterip RHEL7 support") if default['platform'] =~ /el-7/
-          pp = <<-EOS
-            class { '::firewall': }
-            firewall {
-              '830 - clusterip test':
-                chain                 => 'FORWARD',
-                jump                  => 'CLUSTERIP',
-                destination           => '1.1.1.1',
-                iniface               => 'eth0',
-                clusterip_new         => true,
-                clusterip_hashmode    => "sourceip",
-                clusterip_clustermac  => "01:00:5E:00:00:00",
-                clusterip_total_nodes => "2",
-                clusterip_local_node  => "1",
-                clusterip_hash_init   => "1337",
-            }
-          EOS
-
-          apply_manifest(pp, :catch_failures => true)
-        end
-
-        it 'should contain the rule' do
-          pending("MODULES-2124 should be resolved for clusterip RHEL7 support") if default['platform'] =~ /el-7/
-          shell('iptables-save') do |r|
-            expect(r.stdout).to match(/-A FORWARD -d (1.1.1.1\/32|1.1.1.1) -i eth0 -p tcp -m comment --comment "830 - clusterip test" -j CLUSTERIP --new --hashmode sourceip --clustermac 01:00:5E:00:00:00 --total-nodes 2 --local-node 1 --hash-init 1337/)
-          end
-        end
-      end
-    end
-  end
-end
+
+# These tests have been commented out, as there are suspicions that the clusterIP ipt module is causing system reboots.
+
+
+# require 'spec_helper_acceptance'
+
+# describe 'firewall type', :unless => UNSUPPORTED_PLATFORMS.include?(fact('osfamily')) do
+
+#   before(:all) do
+#     shell('iptables --flush; iptables -t nat --flush; iptables -t mangle --flush')
+#     shell('ip6tables --flush; ip6tables -t nat --flush; ip6tables -t mangle --flush')
+#   end
+
+#   # SLES doesn't have the CLUSTERIP module
+#   if default['platform'] !~ /sles/
+#     describe 'clusterip' do
+#       context 'cluster ipv4 test' do
+#         it 'applies' do
+#           pending("MODULES-2124 should be resolved for clusterip RHEL7 support") if default['platform'] =~ /el-7/
+#           pp = <<-EOS
+#             class { '::firewall': }
+#             firewall {
+#               '830 - clusterip test':
+#                 chain                 => 'FORWARD',
+#                 jump                  => 'CLUSTERIP',
+#                 destination           => '1.1.1.1',
+#                 iniface               => 'eth0',
+#                 clusterip_new         => true,
+#                 clusterip_hashmode    => "sourceip",
+#                 clusterip_clustermac  => "01:00:5E:00:00:00",
+#                 clusterip_total_nodes => "2",
+#                 clusterip_local_node  => "1",
+#                 clusterip_hash_init   => "1337",
+#             }
+#           EOS
+
+#           apply_manifest(pp, :catch_failures => true)
+#         end
+
+#         it 'should contain the rule' do
+#           pending("MODULES-2124 should be resolved for clusterip RHEL7 support") if default['platform'] =~ /el-7/
+#           shell('iptables-save') do |r|
+#             expect(r.stdout).to match(/-A FORWARD -d (1.1.1.1\/32|1.1.1.1) -i eth0 -p tcp -m comment --comment "830 - clusterip test" -j CLUSTERIP --new --hashmode sourceip --clustermac 01:00:5E:00:00:00 --total-nodes 2 --local-node 1 --hash-init 1337/)
+#           end
+#         end
+#       end
+#     end
+#   end
+# end