summaryrefslogtreecommitdiffstats
path: root/tests/py/inet/reject.t.json.output
diff options
context:
space:
mode:
authorPhil Sutter <phil@nwl.cc>2018-05-08 13:08:45 +0200
committerPablo Neira Ayuso <pablo@netfilter.org>2018-05-11 12:17:45 +0200
commitd196dccf1853039656f15c8da94ad349a3b7d07c (patch)
treeada3c2446bd764efd12fed37ea7a9bc16ab4b328 /tests/py/inet/reject.t.json.output
parent875232bc3e6bf55cc31f3763449503a80a7c2382 (diff)
tests/py: Support testing JSON input and output as well
This extends nft-test.py by optional JSON testing capabilities, activated via '-j'/'--enable-json' parameter). JSON testing happens for all rules which are supposed to work: After a rule has been added and the existing tests (payload, ruleset listing output) have been performed, basically the same test is done again using a recorded JSON equivalent and (if necessary) a recorded listing output. The code tries to ease new test case creation overhead by auto-generating JSON equivalent input via listing the (non-JSON) rule in JSON format. Also, differing netlink debug and listing output are stored in *.got files to assist in analyzing/fixing failing test cases. Signed-off-by: Phil Sutter <phil@nwl.cc> Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
Diffstat (limited to 'tests/py/inet/reject.t.json.output')
-rw-r--r--tests/py/inet/reject.t.json.output224
1 files changed, 224 insertions, 0 deletions
diff --git a/tests/py/inet/reject.t.json.output b/tests/py/inet/reject.t.json.output
new file mode 100644
index 00000000..b1e77990
--- /dev/null
+++ b/tests/py/inet/reject.t.json.output
@@ -0,0 +1,224 @@
+# reject with icmp type host-unreachable
+[
+ {
+ "match": {
+ "left": {
+ "meta": "nfproto"
+ },
+ "right": "ipv4"
+ }
+ },
+ {
+ "reject": {
+ "expr": "host-unreachable",
+ "type": "icmp"
+ }
+ }
+]
+
+# reject with icmp type net-unreachable
+[
+ {
+ "match": {
+ "left": {
+ "meta": "nfproto"
+ },
+ "right": "ipv4"
+ }
+ },
+ {
+ "reject": {
+ "expr": "net-unreachable",
+ "type": "icmp"
+ }
+ }
+]
+
+# reject with icmp type prot-unreachable
+[
+ {
+ "match": {
+ "left": {
+ "meta": "nfproto"
+ },
+ "right": "ipv4"
+ }
+ },
+ {
+ "reject": {
+ "expr": "prot-unreachable",
+ "type": "icmp"
+ }
+ }
+]
+
+# reject with icmp type port-unreachable
+[
+ {
+ "match": {
+ "left": {
+ "meta": "nfproto"
+ },
+ "right": "ipv4"
+ }
+ },
+ {
+ "reject": null
+ }
+]
+
+# reject with icmp type net-prohibited
+[
+ {
+ "match": {
+ "left": {
+ "meta": "nfproto"
+ },
+ "right": "ipv4"
+ }
+ },
+ {
+ "reject": {
+ "expr": "net-prohibited",
+ "type": "icmp"
+ }
+ }
+]
+
+# reject with icmp type host-prohibited
+[
+ {
+ "match": {
+ "left": {
+ "meta": "nfproto"
+ },
+ "right": "ipv4"
+ }
+ },
+ {
+ "reject": {
+ "expr": "host-prohibited",
+ "type": "icmp"
+ }
+ }
+]
+
+# reject with icmp type admin-prohibited
+[
+ {
+ "match": {
+ "left": {
+ "meta": "nfproto"
+ },
+ "right": "ipv4"
+ }
+ },
+ {
+ "reject": {
+ "expr": "admin-prohibited",
+ "type": "icmp"
+ }
+ }
+]
+
+# reject with icmpv6 type no-route
+[
+ {
+ "match": {
+ "left": {
+ "meta": "nfproto"
+ },
+ "right": "ipv6"
+ }
+ },
+ {
+ "reject": {
+ "expr": "no-route",
+ "type": "icmpv6"
+ }
+ }
+]
+
+# reject with icmpv6 type admin-prohibited
+[
+ {
+ "match": {
+ "left": {
+ "meta": "nfproto"
+ },
+ "right": "ipv6"
+ }
+ },
+ {
+ "reject": {
+ "expr": "admin-prohibited",
+ "type": "icmpv6"
+ }
+ }
+]
+
+# reject with icmpv6 type addr-unreachable
+[
+ {
+ "match": {
+ "left": {
+ "meta": "nfproto"
+ },
+ "right": "ipv6"
+ }
+ },
+ {
+ "reject": {
+ "expr": "addr-unreachable",
+ "type": "icmpv6"
+ }
+ }
+]
+
+# reject with icmpv6 type port-unreachable
+[
+ {
+ "match": {
+ "left": {
+ "meta": "nfproto"
+ },
+ "right": "ipv6"
+ }
+ },
+ {
+ "reject": null
+ }
+]
+
+# mark 12345 reject with tcp reset
+[
+ {
+ "match": {
+ "left": {
+ "meta": "l4proto"
+ },
+ "right": 6
+ }
+ },
+ {
+ "match": {
+ "left": {
+ "meta": "mark"
+ },
+ "right": 12345
+ }
+ },
+ {
+ "reject": {
+ "type": "tcp reset"
+ }
+ }
+]
+
+# reject with icmpx type port-unreachable
+[
+ {
+ "reject": null
+ }
+]
+